Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Richarte, Gerardo"'
As penetration testing frameworks have evolved and have become more complex, the problem of controlling automatically the pentesting tool has become an important question. This can be naturally addressed as an attack planning problem. Previous approa
Externí odkaz:
http://arxiv.org/abs/1306.4040
Assessing network security is a complex and difficult task. Attack graphs have been proposed as a tool to help network administrators understand the potential weaknesses of their network. However, a problem has not yet been addressed by previous work
Externí odkaz:
http://arxiv.org/abs/1306.4044
The MySQL challenge-and-response authentication protocol is proved insecure. We show how can an eavesdropper impersonate a valid user after witnessing only a few executions of this protocol. The algorithm of the underlying attack is presented. Finall
Externí odkaz:
http://arxiv.org/abs/1006.2411
In this work we start walking the path to a new perspective for viewing cyberwarfare scenarios, by introducing conceptual tools (a formal model) to evaluate the costs of an attack, to describe the theater of operations, targets, missions, actions, pl
Externí odkaz:
http://arxiv.org/abs/1006.1916
Autor:
García, Gabriel, Alonso, Sergio, Takáts, Katalin, Gonfaus, Josep Maria, Gallés, Pau, Gibert, Jaume, Vilaseca, David, Richarte, Gerardo, Marín, Javier
Session 5B-Richarte-An Empirical Study of Applying AI on the Edge for Earth Observation
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1a1d6859739b977e577779d9ee00bb62
Publikováno v:
Proceedings of the 4th ACM Workshop: Security & Artificial Intelligence; Oct2011, p71-80, 10p